Preventing procurement fraud in higher education April 3, 2014 © Baker Tilly Virchow Krause, LLP 1 Objectives > Illustrate the risks associated with the contracting process > Define the parameters of fraud versus human error and mistakes > Highlight examples of best practices in contract administration > Identify strategies and internal controls to reduce procurement risk © Baker Tilly Virchow Krause, LLP 2 Contents/Agenda > Overview: Why fraud occurs > Types of procurement fraud > How colleges and universities can fall short > Detecting procurement fraud > Fraud investigation considerations > Strategies for preventing procurement fraud © Baker Tilly Virchow Krause, LLP 3 Overview: Why fraud occurs © Baker Tilly Virchow Krause, LLP 4 Fraud > Fraud /frôd/ Wrongful or criminal deception intended to result in financial or personal gain. A person or thing intended to deceive others, typically by unjustifiably claiming or being credited with accomplishments or qualities. Synonyms - Swindle – Trickery – Deception – Scam - Cheat © Baker Tilly Virchow Krause, LLP 5 Why people commit fraud Pressure • Political pressure. • They were asked to perform a small “favor” this one-time. • Financial stress (e.g., high medical bills, gambling addiction). • Desire to advance in their career. Opportunity • Individuals think no one is watching. • They got away with it once, so why not do it again. • Perceived understanding of how to “beat” the system. • Weaknesses in internal controls. Rationalization • Individuals believe they are justified in their actions and can repay the money before anyone notices. • Belief they are underpaid and the action is justified. • Family obligations. © Baker Tilly Virchow Krause, LLP Source: Fraud Triangle, Donald R. Cressey 6 Types of procurement fraud adapted from the Uniform Occupational Fraud Classification System © Baker Tilly Virchow Krause, LLP Source: Association of Certified Fraud Examiners 7 Types of procurement fraud: Corruption Bid Rigging Bribery • The agreement of multiple bidders to manipulate the procurement process. • Bidders agree to rotate bidding, bid high prices, or participate in anticompetitive practices. • Vendors provide kickbacks to purchasers and authority makers in exchange for contracts. • The bribe can be monetary, tickets to sporting events or work on personal property. • A person with a fiduciary responsibility to the institution exploits their position for personal benefit. • An example is a Project Manager for the installation of a new soccer field who fails to disclose Conflicts that he has partial ownership in the selected firm completing the work. of Interest P-Card Misuse • Employees use their P-Card to purchase personal items. • Employees purchase restricted items e.g. alcohol. © Baker Tilly Virchow Krause, LLP 8 Types of procurement fraud : Corruption continued Phantom Vendors Splitting • Fictitious vendors are established as reputable firms. • Payments are made to these vendors even though work was never performed. • In order to avoid the threshold for competitively procuring goods and services, the request is split into small purchases. • The cumulative amount of the purchase order is well over the bid threshold. • Suppliers submit substitute items without prior approval of the requestor. • The substitute items are inferior to the specifications and can either be of lesser cost or lesser quality. However, the institution is billed at the higher Substitution price. of Items © Baker Tilly Virchow Krause, LLP 9 Types of procurement fraud : Asset misappropriation • Suppliers intentionally ship an incomplete order, but the receiving slip states that a full order was delivered. Asset Misappropriation • Employees steal inventory. • Good inventory is marked as scrap so that it can be discarded and then resold. © Baker Tilly Virchow Krause, LLP 10 Types of procurement fraud : Fraudulent statements Fictitious Revenues • Firms overstate their financial revenues to appear more financially solvent than they really are. • Institutions believe that the firm is in good financial health, but the firm may be on the brink of bankruptcy or not in a position to complete the work. • Firms fail to disclose their full ownership structure, which may lead to doing business with debarred or decertified firms. Improper • Firms fail to state any current or legal issues that may impact the award of their contract. Disclosures • Firms provided inflated qualifications of their company and staff performing the work. Overstated • They may overstate their success rate with past projects or experience performing comparable projects. Credentials © Baker Tilly Virchow Krause, LLP 11 Polling Question #1 Which type of procurement fraud has had the most impact on your institution? A. B. C. D. E. F. G. Collusion/bid rigging Splitting transactions to remain below the competitive bid limit Substitution of items by suppliers without prior approval Purchase card misuse Submittal of false documents by vendors and/or employees All of the above None of the above © Baker Tilly Virchow Krause, LLP 12 How colleges and universities can fall short © Baker Tilly Virchow Krause, LLP 13 Weaknesses in the procurement process > Decentralized procurement function > Lack of segregation of duties > Maverick or after-the-fact purchases > Lack of a three-way match process > Failure to have a formal procurement policy > Lack of cross-training for staff > Lack of an internal audit function © Baker Tilly Virchow Krause, LLP 14 Detecting fraud © Baker Tilly Virchow Krause, LLP 15 What to look for Internal Signs > Purchase orders created after hours (e.g., weekends, evenings, holidays) > An initial low bid is awarded, followed by multiple change orders > Minimal documentation for procurement requests submitted > A losing bidder is hired by the winning bidder, which may suggest that the winning bidder did not have the qualifications to perform the work > Close social relationships between suppliers and college and university personnel (e.g., gifts, trips, tickets) External Signs > The ownership structure is the same for multiple firms > Companies who share offices with other suppliers that do business with your institution © Baker Tilly Virchow Krause, LLP 16 Fraud investigation considerations © Baker Tilly Virchow Krause, LLP 17 Establishing a fraud incident plan Establish a fraud incident plan to outline how the investigation will be conducted and the necessary resources. Approach • • • • • Create an investigation plan Maintain communication with the investigation team Take corrective action as soon as possible Have a debriefing meeting after the investigation Develop a public relations strategy © Baker Tilly Virchow Krause, LLP Considerations • Internal and external resources • Applicable state statues and laws • Investigation budget • Timeline for completion • Reporting requirements 18 Steps in a typical investigation Step Action 1. Notify the right people • • • • Notify HR for personnel matters Legal department for advice and representation Department and institutional leadership Do not include anyone what may have a conflict of interest with the investigation 2. Designate a lead investigator • • Head of Internal Audit Outside investigator 3. Suspend service • Determine if services may continue during the investigation 4. Collect the evidence • Secure any evidence relating to the vendor, including contracts, invoices, formal correspondence and goods provided Collect any emails and voice mails Preserve and log legal documentation and establish chain of custody • • 5. Perform interviews © Baker Tilly Virchow Krause, LLP • • • Develop an interview plan Interview appropriate parties as soon as possible Determine if interviews should be recorded 19 Questions to ask > Were the actions deliberate and intentional? > Was the offense committed by one or more individuals? > At what stage in the procurement process did the fraud occur? > Was fictitious paperwork created? > Was the contract established to facilitate fraud? > Are there protocols in place that should have caught the fraud? © Baker Tilly Virchow Krause, LLP 20 Reporting the results Once the investigation is complete, report the results as quickly as possible. Potential considerations include: > Issuing a final report that details the findings and results. > Updating/implementing all applicable policies and procedures to address weakness in internal controls. > Sharing any key take-aways to prevent future fraud through staff development and training. > Determining if any disciplinary action should be taken or if the case should be referred to law enforcement as a criminal matter. © Baker Tilly Virchow Krause, LLP 21 Polling question #2 Which is a consideration for a fraud management plan? A. Including all parties that were involved in the incident throughout the process. B. Establishing an unlimited budget. C. Determining if external resources are necessary. D. All of the above. © Baker Tilly Virchow Krause, LLP 22 Strategies for preventing procurement fraud © Baker Tilly Virchow Krause, LLP 23 Competencies for contract managers Technical Competencies Aligned Skills Perform Requirements Planning • • • Determine appropriate procurement method Write detailed requirements/scope of work Create an appropriate cost structure Effectively Communicate with Bidders • • Lead pre-bid/pre-proposal conferences Respond to bidder inquiries via a formal addendum Perform Technical Analysis of Proposals • Evaluate bidder responsiveness to the requirements and nonprice factors Evaluate pricing proposals Perform bidder due diligence e.g., background checks and site visits • • Perform Negotiations • • Lead negotiations Conduct discussions with bidders to determine their capacity and qualifications Manage Vendor Performance • • Inspection and acceptance of goods and services Contract monitoring to ensure work performed is in compliance with contract terms Hold regular meetings to review vendor performance • © Baker Tilly Virchow Krause, LLP 24 Contract management strategies > Develop detailed specifications and/or scope of services • • Clearly state the “Who, What, When, Why, Where and How” the services are to be provided. Include deliverable due dates, special qualifications/licenses needed, and how the final product will be provided to the institution. > Conduct research and background checks on bidders before they are awarded a contract • • Use web-based searches and disclosure statements to research vendors (e.g., Google, LexisNexis, and Secretary of State business search) Conduct searches on current and past directorship and consider extending the searches two levels down to look for common links. > Perform announced and unannounced site visits • • Determine if the vendor has appropriate inventory and supplies for the business they are in. Interview the owner to understand how involved they are in the daily operations of the business. © Baker Tilly Virchow Krause, LLP 25 Contract management strategies (continued) > Include pertinent clauses in contractual documents • • Stipulate language that details minimum performance standards, dispute resolution steps, and penalties for failure to meet performance expectations. Sample clauses include right to audit, substitutions, compliance with all laws and termination for cause/convenience. > Include performance indicators in contracts and evaluate vendors on them • • Establish the frequency for evaluating performance indicators within the contract. Make the indicators specific and measurable. > Maintain segregation of duties and internal controls • • The person who approves the purchase should not be the person who makes the purchase request. Automate the procurement process so that there is an audit trail. © Baker Tilly Virchow Krause, LLP 26 Centralized versus decentralized procurement Centralized model Decentralized model Dispersed procurement authority All decision making authority Oversight Sets policy Centralized procurement Maintains vendor contact © Baker Tilly Virchow Krause, LLP Individual units issue POs No single point of oversight Issues POs Policy responsibility 27 Procurement analytics Procurement systems can provide reports that can be used to monitor purchases for fraud and abuse. P-Cards • • • • • • Split transactions Over limit transactions Even dollar amounts Purchases made during non-office hours Multiple purchases to one vendor Account credits and declines © Baker Tilly Virchow Krause, LLP POs and Contracts • • • • • • Unauthorized approvals Payments made within a week Similar invoices Purchase orders made during non-office hours Multiple purchase orders to the same vendor Even dollar amounts 28 Ethical behaviors Conflicts of Interest • Avoid the appearance of impropriety. • Avoid professional or personal activity that would create a conflict of interest. • Shelter the procurement process from political influence. Conduct with Suppliers • Refrain from showing favoritism to suppliers. • Refrain from asking suppliers to provide donations or sponsorships. • Treat all suppliers the same. Best Practices • Maintain a Corporate Responsibility Policy • Promote a fair and transparent policy (e.g., require competition and post awards online) • Limit or prohibit gifts and meals with suppliers © Baker Tilly Virchow Krause, LLP 29 Characteristics of a strong procurement function Support from institutional leadership Establish clear policies and procedures. Communicate that fraud will not be tolerated. Whistleblower program Anonymous hotline No retaliation Constant monitoring Be diligent – frequent and by surprise © Baker Tilly Virchow Krause, LLP Cross- train employees Trending analysis 30 Polling question #3 Which is not a strategy for preventing procurement fraud? A. Train staff on ethical practices B. Develop contracts that have a clear scope of services and relevant contractual clauses. C. Refrain from communicating with vendors during the bidding process D. Cross-train all staff to understand how internal systems work © Baker Tilly Virchow Krause, LLP 31 Resources © Baker Tilly Virchow Krause, LLP 32 Resources > Association of Certified Fraud Examiners, Fraud Tree: https://acfe.com/fraud-tree.aspx/ > National Association of Educational Procurement website: http://www.naepnet.org > National Institute for Governmental Procurement website: http://www.nigp.org > The Institute for Internal Auditors website: https://na.theiia.org/ © Baker Tilly Virchow Krause, LLP 33 Required disclosure and Circular 230 Prominent Disclosure The information provided here is of a general nature and is not intended to address the specific circumstances of any individual or entity. In specific circumstances, the services of a professional should be sought. Pursuant to the rules of professional conduct set forth in Circular 230, as promulgated by the United States Department of the Treasury, nothing contained in this communication was intended or written to be used by any taxpayer for the purpose of avoiding penalties that may be imposed on the taxpayer by the Internal Revenue Service, and it cannot be used by any taxpayer for such purpose. No one, without our express prior written permission, may use or refer to any tax advice in this communication in promoting, marketing, or recommending a partnership or other entity, investment plan or arrangement to any other party. Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. © 2012 Baker Tilly Virchow Krause, LLP. © Baker Tilly Virchow Krause, LLP 34
© Copyright 2026 Paperzz